Covert Network Analysis to Detect Key Players using Correlation and Social Network Analysis

被引:2
|
作者
Farooq, Ejaz [1 ]
Khan, Shoab A. [1 ]
Butt, Wasi Haider [1 ]
机构
[1] Natl Univ Sci & Technol NUST, Dept Comp Engn, H-12, Islamabad, Pakistan
关键词
Key player; preprocessing; similarity measures; CENTRALITY;
D O I
10.1145/3018896.3025142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Cancelable Fusion using Social Network Analysis
    Paul, Padma Polash
    Gavrilova, Marina
    2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2013, : 1469 - 1471
  • [32] Finding experts using social network analysis
    Fu, Yupeng
    Xiang, Rongjing
    Liu, Yiqun
    Zhang, Min
    Ma, Shaoping
    PROCEEDINGS OF THE IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE: WI 2007, 2007, : 77 - 80
  • [33] Cooperative Learning Using Social Network Analysis
    Wei Hantian
    Wang Furong
    INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 511 - +
  • [34] Using Social Network Analysis for Spam Detection
    DeBarr, Dave
    Wechsler, Harry
    ADVANCES IN SOCIAL COMPUTING, PROCEEDINGS, 2010, 6007 : 62 - 69
  • [35] Using social network analysis to combat counterfeiting
    Ting, S. L.
    Tsang, Albert H. C.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2014, 52 (15) : 4456 - 4468
  • [36] Social network analysis
    Bustíková, L
    SOCIOLOGICKY CASOPIS, 1999, 35 (02): : 193 - 206
  • [37] Social Network Analysis
    Idri, Nadia
    ARAB WORLD ENGLISH JOURNAL, 2015, : 226 - 229
  • [38] SOCIAL NETWORK ANALYSIS
    SCOTT, J
    SOCIOLOGY-THE JOURNAL OF THE BRITISH SOCIOLOGICAL ASSOCIATION, 1988, 22 (01): : 109 - 127
  • [39] Analysis of a Social Network
    Boban, Ivan
    Mujkic, Admir
    Dugandzic, Ivan
    Bijedic, Nina
    Hamulic, Indira
    2014 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2014, : 129 - 132
  • [40] Sociocentric and Egocentric Measures for Identifying the Key Players in Telecom Social Network
    Pushpa
    Shobha, G.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 366 - 372